{"id":63068,"date":"2016-12-01T08:31:00","date_gmt":"2016-12-01T00:31:00","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=63068"},"modified":"2016-12-01T08:31:00","modified_gmt":"2016-12-01T00:31:00","slug":"gooligan-breached-google-accounts","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2016\/12\/01\/gooligan-breached-google-accounts\/","title":{"rendered":"Gooligan Breached More Than One Million Google Accounts"},"content":{"rendered":"<p>If you are using Android OS\u00a04 or 5, please read this Press Release by Check Point on Gooligan, the new Android Malware variant that has till date, breached the security of more than one million Google accounts.<\/p>\n<p><a href=\"https:\/\/gooligan.checkpoint.com\/\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"63069\" data-permalink=\"https:\/\/techielobang.com\/blog\/2016\/12\/01\/gooligan-breached-google-accounts\/gooligan-check-point\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?fit=600%2C438&amp;ssl=1\" data-orig-size=\"600,438\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"gooligan-check-point\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?fit=300%2C219&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?fit=600%2C438&amp;ssl=1\" class=\"aligncenter size-full wp-image-63069\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?resize=600%2C438\" alt=\"gooligan-check-point\" width=\"600\" height=\"438\" srcset=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?w=600&amp;ssl=1 600w, https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?resize=300%2C219&amp;ssl=1 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><b style=\"color: #222222;\"><\/b><\/p>\n<p><!--more--><\/p>\n<p>I have checked my account using Check Point online tool. It is not breached by Gooligan, according to the online check. You can check yours too.<\/p>\n<h2><a href=\"https:\/\/gooligan.checkpoint.com\/\" target=\"_blank\">Click Here to Check if Your Google Account is Breached by Googilan<\/a><\/h2>\n<p>It just take a minute. Read the Press Release for more details.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Press Release<\/strong><\/span><\/p>\n<h2 style=\"text-align: center;\">More Than 1 Million Google Accounts Breached by Gooligan, New Android Malware Variant<\/h2>\n<p style=\"text-align: center;\"><em>Check Point reveals a major Google security breach, caused by a new Android malware variant that infects over 13,000 devices every day<\/em><\/p>\n<p><strong>Singapore, Wed, 30 Nov 2016<\/strong> &#8211; Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP) today announced its security researchers have revealed a new\u00a0variant of Android malware, breaching the security of more than one million Google accounts. The new malware campaign, named Gooligan, roots Android\u00a0devices and steals email addresses and authentication tokens stored on them. With this information, attackers can access users&#8217; sensitive data from Gmail,\u00a0Google Photos, Google Docs, Google Play, Google Drive, and G Suite.<\/p>\n<p><span style=\"color: #222222;\">&#8220;This theft of over a million Google account details is very alarming and represents the next stage of cyber-attacks,&#8221; said Michael Shaulov, Check Point&#8217;s head\u00a0of mobile products. &#8220;We are seeing a shift in the strategy of hackers, who are now targeting mobile devices in order to obtain the sensitive information that is\u00a0stored on them.&#8221;<\/span><br style=\"color: #222222;\" \/><br style=\"color: #222222;\" \/><b style=\"color: #222222;\">Key Findings:<\/b><\/p>\n<ul>\n<li>Campaign infects 13,000 devices each day and is the first to root over a million devices.<\/li>\n<li>Hundreds of the email addresses are associated with enterprise accounts worldwide.<\/li>\n<li>Gooligan targets devices on Android 4 (Jelly Bean, KitKat) and 5 (Lollipop), which represent\u00a0<b style=\"color: #222222;\">nearly 74% of Android devices in use today.<\/b><\/li>\n<li>After attackers gain control over the device, they generate revenue by fraudulently installing apps from Google Play and rating them on behalf of the victim.<\/li>\n<li>Every day Gooligan installs at least 30,000 apps on breached devices, or over 2 million apps since the campaign began.<\/li>\n<\/ul>\n<p><span style=\"color: #222222;\">Check Point reached out to the Google security team immediately with information on this campaign. &#8220;We appreciate Check Point&#8217;s partnership as we&#8217;ve\u00a0worked together to understand and take action on these issues. As part of our ongoing efforts to protect users from the Ghost Push family of malware, we&#8217;ve\u00a0taken numerous steps to protect our users and improve the security of the Android ecosystem overall,&#8221; stated Adrian Ludwig, director of Android security,\u00a0Google.<\/span><br style=\"color: #222222;\" \/><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Check Point&#8217;s Mobile Research Team first encountered Gooligan&#8217;s code in the malicious SnapPea app last year\u00a0(<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/blog.checkpoint.com\/2015\/07\/10\/adware-or-apt-snappea-downloader-an-a\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/blog.checkpoint.com\/2015\/07\/10\/adware-or-apt-snappea-downloader-an-a&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNFvMFmnXy48__jRo3HUiKOjGHwXEA\">http:\/\/blog.checkpoint.com\/2015\/07\/10\/adware-or-apt-snappea-downloader-an-a<\/a><span style=\"color: #222222;\">\u2026). In August 2016, the malware reappeared with a new variant and has\u00a0since infected at least 13,000 devices per day.\u00a0<\/span><b style=\"color: #222222;\">About 40% of these devices are located in Asia and about 12% are in Europe.\u00a0<\/b><span style=\"color: #222222;\">Hundreds of the exposed email\u00a0addresses are associated with enterprises around the world. The infection begins when a user downloads and installs a Gooligan-infected app on a vulnerable\u00a0Android device, or by clicking on malicious links in phishing attack messages.<\/span><br style=\"color: #222222;\" \/><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Check Point is offering a free online tool (<\/span><a style=\"color: #1155cc;\" href=\"https:\/\/gooligan.checkpoint.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/gooligan.checkpoint.com\/&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNE4A7eV2M5ewG6h6P0E4SqeK2Vsow\">https:\/\/gooligan.checkpoint.com\/<\/a><span style=\"color: #222222;\">) that allows users to check if their account has been breached. &#8220;If your account has\u00a0been breached, a clean installation of an operating system on your mobile device is required. This complex process is called flashing, and we recommend\u00a0powering off your device, and approaching a certified technician or your mobile service provider, to re-flash your device,&#8221; added Shaulov.<\/span><br style=\"color: #222222;\" \/><br style=\"color: #222222;\" \/><b style=\"color: #222222;\">Follow Check Point via:<\/b><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Check Point Blog:\u00a0<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/blog.checkpoint.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/blog.checkpoint.com\/&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNHmhcwY8qT43N1m3XNShetRB2Fipg\">http:\/\/blog.checkpoint.com\/<\/a><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Twitter:\u00a0<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/www.twitter.com\/checkpointsw\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.twitter.com\/checkpointsw&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNHX0IQkuDo56LzI1nJPNoGlY2vd3w\">http:\/\/www.twitter.com\/checkpointsw<\/a><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Facebook:\u00a0<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/www.facebook.com\/checkpointsoftware\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.facebook.com\/checkpointsoftware&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNEWmBojPf2D0y6PIaQlzTNE_OgPNw\">http:\/\/www.facebook.com\/checkpointsoftware<\/a><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">YouTube:\u00a0<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/www.youtube.com\/user\/CPGlobal\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.youtube.com\/user\/CPGlobal&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNF0zguVyUF-Uws14KZL1j554UFXcw\">http:\/\/www.youtube.com\/user\/CPGlobal<\/a><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">LinkedIn:\u00a0<\/span><a style=\"color: #1155cc;\" href=\"https:\/\/www.linkedin.com\/company\/check-point-software-technologies\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.linkedin.com\/company\/check-point-software-technologies&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNEnbb7d3ujnR7BJXTkDUGv3il_7TA\">https:\/\/www.linkedin.com\/company\/check-point-software-technologies<\/a><br style=\"color: #222222;\" \/><br style=\"color: #222222;\" \/><b style=\"color: #222222;\">About Check Point Software Technologies Ltd.<\/b><br style=\"color: #222222;\" \/><span style=\"color: #222222;\">Check Point Software Technologies Ltd. (<\/span><a style=\"color: #1155cc;\" href=\"http:\/\/www.checkpoint.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.checkpoint.com\/&amp;source=gmail&amp;ust=1480637597871000&amp;usg=AFQjCNEXpyiA2og8b5HszLmZ6XxYYZjvYw\">www.checkpoint.com<\/a><span style=\"color: #222222;\">) is the largest network cyber security vendor globally, providing industry-leading solutions and\u00a0protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security\u00a0architecture defending enterprises \u2013 from networks to mobile devices \u2013 in addition to the most comprehensive and intuitive security management. Check Point\u00a0protects over 100,000 organizations of all sizes.<\/span><\/p>\n<p>[ad#img]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are using Android, please read this by Check Point on Gooligan that has till date, breached the security of more than one million Google accounts..<\/p>\n","protected":false},"author":1,"featured_media":63069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[1509,4,5,14],"tags":[37,15255,15560,4357,2415,39,15559,8348,11967,13685,1929,15929,2427,15561,1961],"class_list":["post-63068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-information","category-mobile","category-techie","tag-android","tag-android-os","tag-check-point","tag-featured-2","tag-free","tag-google","tag-gooligan","tag-jelly-bean","tag-kitkat","tag-lollipop","tag-malware","tag-mobile","tag-online","tag-online-check","tag-security"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2016\/12\/gooligan-check-point.jpg?fit=600%2C438&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-gpe","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/63068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=63068"}],"version-history":[{"count":1,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/63068\/revisions"}],"predecessor-version":[{"id":63070,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/63068\/revisions\/63070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media\/63069"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=63068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=63068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=63068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}